wardriving.pl2020-06-07T09:58:49+02:00tag:wardriving.pl,2020://1XOOPS WebLinks 0.9Copyright (c) 2020, Wi-Fi Security?The Rise and Fall of WPS2013-01-18T19:45:03+01:002013-01-18T19:45:03+01:00tag:wardriving.pl,2020://1.1Wireless local-area networks which are also referred to as WLANs or Wi-Fi are prevalent these days. They are so popular that they can be found installed in offices, colleges, hotels, cafes, and even h ...Brad SlavinNetStumbler
Wireless local-area networks which are also referred to as WLANs or Wi-Fi are prevalent these days. They are so popular that they can be found installed in offices, colleges, hotels, cafes, and even homes. There are many Wi-Fi product vendors and service providers, providing different products with different services and features. The main reason behind them being so popular is the convenience, mobility and ease of implementation they provide compared to the wired network. The end user can easily access the network without the hassle of managing the wires.

Wireless networks are basically based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 set of standards for WLANs. Following is the list of the IEEE 802.11 network protocol standards.

Protocols

Some years back, wireless networks were only a niche technology used for very specific applications. But nowadays they are everywhere and every now and then we find a new Wi-Fi access point through our smart phones, tablets or laptops ? most of which are not even secure.

Most of us have used these access points at some point in time to access the Internet without realizing how much (In)security they provide.

An insecure Wi-Fi network poses a threat not only to the owner but to every user that accesses it. The first line of defense for a Wi-Fi network is encryption, which encrypts the data transmitted between the Wi-Fi enabled device (smart phone, tablet, laptop etc.) and the wireless router. The Wireless Protected Access (WPA) protocol and more recent WPA2 have replaced the older and less-secure practice of Wireless Encryption Protocol (WEP). It is better to go with WPA2 as WEP is relatively easy to crack. Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks by providing encryption mechanisms. But common users know little about wireless security and are scared by the available options to set up these methods.

Because of this unawareness and implementation issues with these protocols, in 2007 Wi-Fi Alliance came up with Wi-Fi Protected Setup (WPS) which allowed home users to easily add new devices to an already existing Wi-Fi network without entering long passphrases.

Wi-Fi Protected Setup (WPS), originally known as Wi-Fi Simple Config, is a computing standard that attempts to allow easy establishment of a secure wireless home network. Almost all major Wi-Fi product vendors (Cisco/Linksys, Netgear, D-Link, Belkin, Buffalo, Technicolor, etc.) have WPS-certified devices. WPS is activated by default on almost all the WPS supporting devices. The main purpose of the standard is on providing usability along with security.

Usage Methods

WPS provides four usage modes for adding a new device to an existing network, which are explained below. But first some terminology that will used in the explanation:

Terminology:

Enrollee: A new device that needs to be added to the network and does not have settings for the wireless network.

Registrar: One which provides wireless settings to the enrollee.

Access Point (AP): One which provides normal wireless network hosting and acts as middleware to pass messages between the enrollee and the registrar.

The four modes provided by WPS can be classified into two groups: In-band and Out-of-band.

This classification is made based upon the channel utilized for the information transfer.

In-Band modes:

Currently only these two modes are covered by WPS certification.

Push-Button-Connect (PBC):

The user merely has to push a button, either an actual or virtual one, on both the Access Point (or a registrar of the network) and the new wireless client device (enrollee). Support of this mode is mandatory for Access Points but optional for connecting devices. Figure 2 shows a Windows 7 machine as an enrollee. PBC on the AP will only be active until authentication has succeeded or timed-out after two minutes (or whatever amount of time the vendor has specified). This option is called wps_pbc in wpa_cli (text-based frontend) which interacts with wpa_supplicant; wpa_supplicant is a WPA Supplicant for Linux, BSD, Mac OS X, and Windows with support for WPA and WPA2.

In this method a Personal Identification Number (PIN) has to be read from either a label or the display unit on the new wireless device. Figure 3 shows a WPS PIN on the label of a D-Link router. This PIN must then be inputted at the representant of the network (usually AP). Alternately, a PIN on the Access Point may be entered into the new device. This can also be explained on the basis of registrar, as following.

Internal Registrar

The user enters the PIN of the Wi-Fi adapter into the web interface of the AP. This option is called wps_pin in wpa_cli.

External Registrar

The user enters the PIN of the AP into a form on the client device (e.g. computer).

This option is called wps_reg in wpa_cli.

The PIN Method is a mandatory standard method; every Wi-Fi Protected Setup (WPS) certified product needs to support it.

In this method the user merely has to bring the new client adjacent to the Access Point to permit a near field communication among the two devices. The NFC method offers strong defense against adding an unintended device to the network. Support of this mode is optional and is not widely deployed.

USB method:

In this method the user uses a USB drive to transfer data between the new client device and the Access Point of the network. Support of this mode is optional, but denounced.

Protocol

Wi-Fi Protected Setup doesn?t enhance security features to devices. It simply makes the existing security features easy to enable and configure. One of the key elements of the WPS protocols is Extensible Authentication Protocol (EAP). EAP is an authentication framework often used in wireless networks and Point-to-Point connections. It provides for the transport and usage of keying material and parameters generated by EAP methods.

The WPS protocol consists as a sequence of EAP message exchanges that are initiated by a user action and relies on an exchange of descriptive information that should precede that user?s action. This descriptive information is transmitted through a new Information Element (i.e., an information component which when combined with other information provides the required information product) that is added to the beacon (periodically send management frame by AP), probe response and optionally to the probe request and association request/response messages.

IEs will hold the possible and the currently installed, configuration methods of the device other than purely informative type-length-values (TLV).

A human trigger is required to initiate the actual session of the protocol after the identification of the device?s capabilities on both the ends. The session consists of 8 messages followed by a message to indicate the protocol is completed (in case of a successful session). The exact stream of messages may change when configuring various kinds of devices (AP or STA).

Until very recently this protocol was used to provide the users with a feature of easy implementation of security on their Wi-Fi networks, but a recently discovered flaw has again put the wireless networks, and hence the users, at risk.

Security Issue

In December 2011 a freelance information security researcher Stefan Viehböck reported a design and implementation flaw in WPS that makes it vulnerable to a very basic hacking technique: brute-force attacks, feasible to perform against WPS-enabled Wireless networks. It can be simply understood as an attacker trying thousands of combinations in rapid sequence until he/she happens on the correct 8-digit PIN that allows authentication to the device. A successful attack on WPS allows unauthorized user to gain access to the network. The research paper of Viehböck can be found at http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. This vulnerability was also independently uncovered by Craig Heffnerof Tactical Network Solutions, and involves how the router responds when incorrect PINs are inputted. When a PIN is entered, the router implementing WPS indicates whether the first or second halves of the PIN are correct or not.

The vulnerability revolves around the acknowledgement messages transmitted between the registrar and enrollee during the validation process of a PIN. The PIN, which is printed on the side label of each WPS-enabled Wi-Fi router, is an 8 digit number. As the last digit is a checksum of the previous digits,there are seven unknown digits in each PIN, yielding a total of 107 = 10,000,000 possible combinations. The first and second halves of the PIN are separately validated and reported by the registrar when an enrollee tries to gain access through the PIN.

Now the maximum number of guesses required for PIN recovery is 11,000 (104=10,000 from the first half + 103=1,000 from the second half). This is a drastic reduction of the orders of degreea from the number of PINs that would have to be tested in the absence of the design flaw (i.e. 107=100,000,000). The result of this flaw is the presence of a practical attack which can be finished within hours. The difficulty of exploiting this flaw is that it is dependent on the implementation of WPS by the vendor, as Wi-Fi router manufacturers could guard against this attacks by slowing down or disabling the WPS feature after some failed PIN validation efforts.

Two tools have been developed as proof of concept to demonstrate that the attack is practical. Tactical Network Solutions, the Maryland based firm that released the first tool ?Reaver?, states that they are aware of the vulnerability since early 2011. Tactical Network Solutions decided to release the tool after the vulnerability was made public. It is also selling a commercial version called ?Reaver Pro? with some more features. Reaver is hosted on Google Code at http://code.google.com/p/reaver-wps/. Its authors say that it can recover a router?s plain-text WPA or WPA2 password in 4 to 10 hours, depending on the access point.

The second tool is a PoC brute force tool implemented in Python and is a bit faster than Reaver, but supports less wireless adapters, as stated on the author?s website (http://sviehb.wordpress.com/). This tool can be found at http://dl.dropbox.com/u/22108808/wpscrack.zip.

Reaver

Reaver, developed by Tactical Network Solutions, runs on Linux. It aims the external registrar functionality mandated by the Wi-Fi Protected Setup requirement. It executes a brute force attack against an access point?s Wi-Fi Protected Setup (WPS) pin number. Once the WPS pin is found, an attacker can recover the WPA PSK and alternately reconfigure the AP?s wireless settings which could lead towards an insecure network. Although Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is recovered. Reaver requires the libpcap (packet capture and transmission) and libsqlite3 (database) libraries and can be built and installed by running the command:

1 $ ./configure
2 $ make
3 # make install

To remove everything installed/created by Reaver, the following command can be used:
1 # make distclean

Once installed the tool can simply be started using the command:
1 # ./reaver

The ??help? argument can be used to show all the arguments available within the tool. Figure 4 shows the help list of the Reaver.

Figure 4. Help list of Reaver

(Source: http://www.hack4fun.eu/2012/01/reaver-wps-wpscrack/)

The only requirement it has is a wireless card capable of raw packet injection. To start the process the wireless card must be put on monitor mode. This can be easily done using the airmon-ng tool from the wireless security testing aircrack-ng tool suite as shown below. 1 # airmon-ng start wlan0

The only essential arguments to Reaver are the interface name and the BSSID of the target AP, an example of which is shown below.1 # reaver -i mon0 -b 00:01:02:03:04:05

Sometimes Reaver just tries the same pin over and over again. This might be because WPS is not enabled on the AP. Run the walsh tool (included in the Reaver-1.3 release) to scan for WPS-enabled APs and make sure the target AP is listed.

For extra information output, the verbose option may be provided using the argument ??v?. Providing the verbose option twice (-vv) will increase verbosity and display each pin number as it is attempted as shown in Figure 5.

Figure 5. Reaver in action

(Source: http://www.hack4fun.eu/2012/01/reaver-wps-wpscrack/)

To speed up the attack the delay between pin attempts can be disabled by adding ??d 0? on the command line (default delay: 1 second).

1 # reaver -i mon0 -b 00:01:02:03:04:05 -vv -d 0

Another option that can speed up an attack is ??dh-small?. This option tells Reaver to use small Diffie-Hellman secret numbers in order to shrink the computational load on the target AP. In case the attacker does not want to reveal his/her MAC address, Reaver also supports MAC spoofing with the ??mac? option, but it must be ensured that the MAC address of your wireless card?s physical interface (wlan0) must be changed ? not the monitor mode interface (usually mon0) ? otherwise the attack won?t work.Reaver keeps on brute forcing the PINs until a successful attempt. It has been stated that some models/vendors/ISPs come pre-configured with a default pin. Some common pins are 12345670, 00005678, 01230000, etc. Reaver attempts known default pins first as a better heuristic. Figure 6 shows a successfully cracked WPS PIN in 32,286 seconds.

Figure 6. Successful Recovery

(Source:http://www.hack4fun.eu/2012/01/reaver-wps-wpscrack/)

Due to interference or low signal strength Reaver sometimes can?t associate with the AP. It might also be a driver issue.

Below is a list of wireless drivers tested by Reaver:

Supported:

The following wireless drivers have been tested or reported to work successfully with Reaver:

ath9k

rtl8187

carl19170

ipw2000

rt2800pci

rt73usb

Partially Supported:

The following wireless drivers have had mixed success, and may or may not work depending on your wireless card:

ath5k

iwlagn

rtl2800usb

b43

Not Supported:

The following wireless drivers/cards have been tested or reported to not work properly with Reaver:

iwl4965

RT3070L

Netgear WG111v3

Technically more than one instance of Reaver can be run against an AP, but this approach is flawed as it will only result in a double resource load on AP. Reaver advanced options (using ??a? attribute) can be utilized to speed up the attack.Mitigation
End users can disable WPS to prevent an attack, but because of the unawareness most people do not turn it off. Some access points don?t even provide an option to disable WPS.

Vendors can mitigate the flaw by introducing sufficiently long lock down periods (after unsuccessful attempts) to make the attack impractical to implement. This will require a new firmware release. Vendors also need to intensively test the protocols before implementing them on their devices, so that such flaws don?t come up in the future.

Conclusion

Today we are all surrounded by many Wi-Fi networks and have used them at some point in time without realizing the issues of the security. The issues discussed in this article are not the only issues related to wireless security, but a recent and major one affecting the privacy of the end users.

As we already know, almost all major router/AP vendors have WPS-certified devices and WPS?PIN (External Registrar) is mandatory for certification, which makes a lot of devices vulnerable to such an attack.

Having a sufficiently long lock-down period (vendor mitigation method) is most likely not a requirement for WPS certification for the device. However it should be a requirement in the new specifications. The vendors need to release new firmware to eliminate the issue. The main argument this issue presents before us is that such other flaws might be already present in other devices/protocols and misused by malicious intruders, hence the only safeguard we need to take is awareness among end users. Also the certifying authorities and the vendors need to thoroughly test the devices/protocols before implementation so that security features ultimately don?t lead towards insecurity.

]]>
Is Marius Milner the unnamed google engineer?2012-05-07T18:45:57+02:002012-05-07T18:45:57+02:00tag:wardriving.pl,2020://1.2Brad SlavinNetStumbler
Although sited in a number of articles about Marius Milner being the alleged Google engineer who was behind the WiFi mapping.

]]>
How Easy Is it to Write Malware for Android?2012-01-16T21:26:51+01:002012-01-16T21:26:51+01:00tag:wardriving.pl,2020://1.3Georgia WeidmanNetStumbler
The Android platform is currently the top selling mobile platform in the U.S., and in quarter four of 2010 smartphones began to outsell PC platforms worldwide. Android was even recently picked up as the choice platform for the U.S. Department of Defense. With the ubiquitousness of Android growing, naturally it and other smartphone platforms will become prime targets for malware authors. Be it for fun or for profit, stealing your information, sending you spam, and other malicious activity, has been a widespread problem in the computing world for years. It is only natural that as smartphones know even more about their users than traditional PC platforms, and have access to additional features such as text messaging and GPS data, that they will be become juicy targets for high tech criminals.

This past year has seen new developments in Android malware both in the wild and by researchers intent on raising awareness and improving the state of security. The Droid Dream attack against Android in early 2011 made headlines for being the first known malware infection inside of the official Android market. The malware was packaged with seemingly legitimate applications, but once installed, the apps turned Android phones into drones in a mobile botnet. This attack had been foreshadowed by security researchers when Jon Oberheide uploaded a proof of concept app to the Android market disguised as an inside look at the upcoming Twilight movie. Though malware analysists and network security experts have been combating botnets for years, smartphones open new avenues of both attack and control, that experts simply don’t have as much experience analyzing. For example security researchers have created proof of concept smartphone botnet scenarios that use text messaging (SMS) for command and control mechanisms.

Putting aside the continually growing sophistication of smartphone based attacks, how easy is it actually to attack Android phones? How much work would be involved to learn how to write an Android app, develop an app that performs malicious activity, and get that app up on the Android market? Is this something that a beginner could feasibly accomplish, or is Android malware solely the realm of hard core criminals with the skills, time, and money to develop cutting edge attack techniques?

I started off by learning a little bit about coding in Android. I have some coding background including in Java, the language from which the Android software development kit was derived. My only previous experience developing for smartphones was writing base operating system level proof of concept malware in C. I had never written a mobile app before. Android Developer offers beginning tutorials, which I worked through to get started. Android prides itself on being easy for developers to pick up and dive into, and that was my experience as well.

My next goal was to write an app that performs malicious activity. Specifically I wanted to steal the smartphones personal identifier (IMEI) and send a text message without giving any indication to the user. As it turns out the Android API has built in capabilities to perform both of those tasks. The only caveat is the user has to be informed at install time that I want access to these clearly potentially dangerous capabilities. Whenever a user installs an Android app, they are presented with a list of potentially dangerous capabilities the app requests. An example install screen is shown below:

I then wondered if malware writers need to somehow bypass this permission model in some way so the dangerous permissions don’t show up at install. Would having a list of dangerous permissions that would allow an app to steal data and run up fraudulent charges raise a red flag to average Android users and deter them from installing an app? I did a search for popular Android apps to take a look at the permissions they request. The general consensus seems to be that the top downloaded Android app of all time is from an obscure company called Facebook. The complete list of permissions the Facebook for Android app requests upon install includes: sending SMS, reading the IMEI, the smartphone’s GPS information, accessing accounts stored on the phone including their credentials, among a long list of others that can be found here. As a sometimes proud member of Facebook since it was for college kids only, I often access Facebook from my computer. Facebook seems to work just fine without sending SMS, knowing my location, or having access to my Gmail password. It appears that being warned about potentially dangerous permissions does nothing to deter users from installing apps to their Androids. To be fair, the Facebook app comes from a legitimate and well known company. Users have less reason to be wary of Facebook than they would the sort of apps seen in the DroidDream attack. That being said, as we saw in the recent detection of spyware in the CarrierIQ service installed by default on many smartphone platforms, any service or app can be a potential malware source, even if the developer doesn’t intend for it to be malicious.

Now that I knew I could just use the Android API’s permission model to make my malicious app, I went about writing it. I thought I would have to search through the Android Development manager to find out the correct code for what I wanted to do. As it turned out, a quick Google search for “Send SMS Android App” or “Access IMEI Android App” revealed several other curious developers asking for and providing the code snippets I needed. For example the code to send an SMS transparently to the user is only a two lines long:

where number is the phone number to send the SMS to, and message is the message to send. By requesting the right permissions I was able to quickly and easily build an app that accessed private data and sent it to another phone through SMS. The SMS does not appear in the user’s sent folder, so users receive no indication that the message has been sent.

My demo app in action video:

My last task was to see about getting my proof of concept app to the Android market. Using a Gmail account that didn’t link back to my real name I was able to sign up, and I used someone else’s credit card (with permission) to sign up. This leads me to believe it is possible for a malware author to leave no trace of her true identity on an app. I didn’t actually publish my app to the market, but other researchers have already proven that a malicious app is automatically published to the Android market upon upload.

My conclusions are that for anyone with any development experience it is easy to pick up the Android programming language. Thus any malware authors with experience on PC platforms will be able to make the switch to Android without any trouble. Also, the Android permission system is not working to keep users safe. The average, security unaware user will often simply install an app regardless of permissions. Using the API to call malicious functionality was straightforward given the correct permissions. Finally, uploading a malicious app to the Android market is trivial.
Read more about Georgia Weidman

]]>
So you want to be a Security Consultant?2011-12-21T21:23:35+01:002011-12-21T21:23:35+01:00tag:wardriving.pl,2020://1.4This is my first guest blogging opportunity on Netstumbler.com and I wanted to discuss what I believe is missing in most of the student/consultants I encounter. I would recommend these things for anyo ...Brad SlavinNetStumbler
This is my first guest blogging opportunity on Netstumbler.com and I wanted to discuss what I believe is missing in most of the student/consultants I encounter. I would recommend these things for anyone preparing to be a consultant in IT security.

So, the first and most important thing to learn in my opinion is TCP/IP. You need to know it as well as you do the alphabet. The majority of people I meet in the University world and out in industry do not have a detailed and thorough knowledge of TCP/IP. For a security consultant it is best that you can look at the packets and know exactly what is taking place at the lowest level the wire. Elite hackers know TCP/IP as well as they can write their name. To be able to secure the environment and the enterprise it is imperative you know it like they do.

Take wireless for example, many people will start playing with Wireshark to observe the traffic over the wireless card, as most of you can attest to when you first use Wireshark with a wireless card you start a capture, and you see NOTHING, because you are at the application layer, and do not have a good understanding of the lower layers, and also do not understand that you need to be in monitor mode to capture traffic for the most part, and you are connected to the network, and cannot sniff the wireless traffic, so as you read the alert message that tells you to check the selection for promiscuous mode, and then you deselect it, and what do you see? You see the 802.3 Ethernet traffic and not the 802.11 traffic you were expecting. Taking it one step further you need an understanding of the PHY layer before you start looking at a tools that analyze it for you.
The second most important thing is to learn Linux and Unix. Also, do not stop at Linux, download one of the Unix virtual machines and play with it until you get proficient at it.

A note on certifications, they are good for getting you an interview, but once you get that interview you have to convince the people there that you know what you are doing. There is no certification that can replace hands-on experience and knowledge, you can get that on your own by using virtual machines and building and running your own test labs. The concern over certifications is most are based on rote memorization, it is the same problem we have in academic circles (more on that in a moment).

The problem with this is when you study and cram for a certification exam you memorize something take a test, and then you get certified, but what does this really mean? In my view it means you studied and took a test, and be honest, some of these classes cram all of the information into your brain in 4-5 days, and if the class does not provide a study guide, or something similar to practice the types of questions you may encounter you would not see 90% and above exam success rates touted by so many sites. Now, we shall discuss academic thinking, most of the ?academics? without industry experience do not understand what I have been talking about either. I was on a team that developed a Master of Science in Information Security, and I was the only non-academic on the team, the entire group was made up of all PhDs but me, and as we discussed the curriculum I focused on teaching the students protocol analysis … that is packets! Well this shocked pretty much all of the team, but I argued my point in many of the meetings, and finally swayed enough support where we had packet and protocol analysis as part of the curriculum

The most important thing I look for when hiring someone when I was running the Network Operations Center (NOC) is desire and initiative to learn. I would interview people with a list of certification as long as their arm, and when I asked them practical questions, they could not answer them, so they did not get the job. This is because I had junior personnel who could answer the questions, so how could I give someone a position over one of them at about 5 times the amount of pay they were getting. I could not justify it, and never did waiver on that. If a person has desire that is the most important thing. I had a guy come in fresh out of bootcamp that did not even know what UNIX was, and in 6 months he became my UNIX expert.

Another thing that helps is understanding programming, you do not have to be proficient at it, but being able to look at code and at least understand the fundamental concepts of it is very important in this field.

Finally, it is all about research, I learned to do research in Graduate school, I had a Professor Frank Coyle that specializes in using JAVA for real time systems, and he was instrumental in teaching me how to do research, and that is the intent of these short research topics, the more practice you get the better you get to be at it. Today with the amount of online information you can research in a few hours with the Internet. When I was in graduate school, I spent weeks doing research at libraries, take advantage of this opportunity we have today. Recommend you dedicate one hour a night to reading something, a whitepaper etc. There is a saying in the consultant field that as long as you can read the manual and understand it faster than the client you will always get the contract. That is why research is so important.

As I like to tell my clients, up until 2006 my certification count was 0, and now it is at 20, so it is not about getting a certification, it is what you do before and after you get that cert.

- Kevin

Kevin Cardwell currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an adviser to numerous government entities within the US and UK.

He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense course. He is technical editor of the Learning Tree Course Ethical Hacking and Countermeasures and Computer Forensics. He is author of the Controlling Network Access course. He has presented at the Blackhat USA Conferences. He is a contributing author to the Computer Hacking Forensics Investigator V3 Study Guide and The Best Damn Cybercrime and Digital Forensics Book Period. He is a Certified Ethical Hacker (CEH), Certified Security analyst (E|CSA), Qualified Penetration Tester (QPT), Certified in Handheld Forensics, Computer Hacking Forensic Investigator (CHFI) and Live Computer Forensics Expert (LCFE), and holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas.

]]>
Offensive Mobile Forensics2011-12-12T17:32:26+01:002011-12-12T17:32:26+01:00tag:wardriving.pl,2020://1.5Christmas is around the corner. Some of the top gifts are going to be shiny new mobile devices ? smartphones, tablets, hacked Kindle Fires, Playbooks, and others. Is Exchange ActiveSync turned on in y ...Brad SlavinNetStumbler
Christmas is around the corner. Some of the top gifts are going to be shiny new mobile devices ? smartphones, tablets, hacked Kindle Fires, Playbooks, and others. Is Exchange ActiveSync turned on in your environment? What is your plan for handling mobility in the Enterprise? But the biggest question of all is ? What does a lost or stolen mobile device mean to your organization in terms of risk? What about when the CEO loses her device? Can you quantify your risk today?

The data leakage disclosed in this post has been gathered from a technique the author refers to as Offensive Mobile Forensics. The term forensics is usually associated with incident response and management. In other words, an activity performed after something bad has happened. In contrast, offensive forensics is the act of preemptively performing a forensic analysis of systems or applications as a function of security testing, or for the purpose of quantifying risk. An interesting side-effect of applying this technique to mobile device analysis is that it enables one to truly understand the risk of an attacker stealing or finding a lost device. For example, if your analysis turns up native or third-party applications storing user credentials in cleartext ? the author has seen everything from Facebook and Twitter to enterprise users? Exchange ActiveSync credentials stored in the clear ? depending on the accounts and data available, that could be a serious issue.
This technique depends on the ability to jailbreak (iOS) or root (Android) the target device, which provides root access to the underlying file system. If the reader is unfamiliar with these terms, some great resources to learn about jailbreaking and rooting are Redmond Pie (iOS) and XDA-Developers (Android). The author typically utilizes Redsn0w for iOS and SuperOneClick for Android, performing virtually all Android analysis on Samsung devices.

iOS

After jailbreaking is complete, only one other tool is necessary, OpenSSH, used to pull data from the device to a host computer for analysis over WiFi. However, as is always the case with information technology, there?s more than one way to accomplish your objective. So, experiment with other tools, and tweak and tune your own methodology.

Although outside the scope of this blog post, readers interested in learning about some of the other tools used for this analysis technique can check out the iOS Insecurities article in November?s issue of Hackin9 Magazine. The article is a greatly expanded version of what?s here, and also includes a table listing physical locations on iOS devices that contain interesting information for analysis.

There are many different locations containing interesting data on iOS devices. Data often resides in SQLite databases, the chosen format for local storage on mobile devices. The next best place to find sensitive information is in plist, or property list files ? these are the primary storage medium for configuration settings in iOS, and they are also a fantastic source of sensitive information. User credentials are often stored here, instead of inside the KeyChain where they should be. Rounding out the top three data sources are binary or binary-encoded files, such as the device?s keyboard cache and pasteboard. Although storage locations commonly change with the release of new iOS firmware, it is fairly simple to poke around the general area and find what you?re looking for.

The most severe threat to mobile devices and applications is loss or theft of the device. As the old saying goes, ?if an attacker has physical access, it is game over.? It only takes a few days of analyzing applications on a device to discover that the vast majority of mobile application developers fail to consider the threat of physical access to their data. Simply put, they are stuck in the mindset of web application or client/server developers, where virtually all threats affect applications remotely. Add some terrible design and implementation decisions related to native apps and services from Apple themselves, and you have a device that can pose a significant risk to enterprises and consumers in the event of loss or theft. The following examples are provided in no particular order.

Keyboard Cache (dynamic-text.dat)

In an effort to learn how users type, iOS devices utilize a feature called AutoCorrection to populate a local keyboard cache on the device. The problem is this feature records everything a user types that is not entered into a SECURE text field, which masks displayed data. The author fondly refers to this feature as ?Apple?s native keylogging facility?. Data typed into text fields for virtually any application can remain in the cache for more than a year if it is not reset periodically by the user:

Settings > General > Reset > Reset Keyboard Dictionary

Developers can also disable this feature programmatically by using the AutoCorrection = FALSE directive in desired UITextFields, although studies conducted with applications disabling this feature have shown users unanimously disapprove of it.

The file itself is a binary file, so passing it to the utility ?strings? is all that is required to generate newline-terminated output suitable for analysis. Figure 1 displays the result of running ?strings? against the file, and Table 1 provides examples of near-complete conversations recorded by AutoCorrection.

Figure 1: Keyboard cache output to stdout in terminal

The keyboard cache is a well-known weakness in the iOS system, and there are many more interesting system-related locations to explore as an exercise for the reader.

Table 1: Keyboard cache entries - read column top-down

Application Data Leakage

Third-party applications represent the greatest threat of data leakage on iOS devices. This is usually the result of lazy or poorly-informed, or trained, developers storing user credentials or other sensitive information in clear text. This threat can be mitigated by developers in several ways including storing user credentials in the KeyChain, encrypting sensitive information in plist files with the Common Crypto library, or encrypting sensitive information in SQLcipher SQLite databases. Figure 2 shows one example of a mobile application improperly storing credentials in a plist file. Unfortunately, this particular application utilizes various Internet APIs for authentication including Evernote, Google Docs, Dropbox, and others, which in the event of loss or theft, could result in the compromise of each account.

Although there are many similarities between iOS and Android, there are a few notable differences that should be discussed. First, Android does not use property list files (?plist?) for storing configuration data, which is common on iOS devices. Android uses XML files instead of plists. Also, analysts will find many more SQLite databases on an Android device. In fact, configuration information is sometimes stored in SQLite database in lieu of utilizing XML files. Similarly to the configuration files for iOS, the XML files storing preferences for Android applications commonly include user credentials and other sensitive information. Finally, there is a very rich diagnostic and debugging environment in the Android platform, and unfortunately this output is also a common source of data leakage.

A huge difference between iOS devices and Android devices is the presence of the Android Debug Bridge (?ADB?) for the latter. Using the ADB, one can push or pull files to the device, review diagnostic information, and even gain access to a remote shell. The ADB Shell is the primary method of accessing the device’s file system for the purposes of pulling data to a host computer for analysis, or performing analysis on the device itself. More information on this, and other, differences can be found in the Android Insecurities article in January?s issue of Hakin9 Magazine.

Annotated WiFi Credentials

Email

The Android system, like iOS, stores email in a SQLite database. Unlike iOS however, which stores email credentials in the KeyChain, user credentials on an Android system are stored in cleartext in the email database. This may seem like a trivial occurrence of data leakage, but in addition to personal email accounts such as Gmail, Exchange ActiveSync (?EAS?) credentials are also stored there. As if credentials weren’t bad enough, the database also stores messages in the clear, along with email addresses of contacts that have sent the user mail. This could be particularly devastating for corporate enterprises utilizing EAS, in the absence of a proper mobile device management (?MDM?) solution.

EAS and personal email account credentials can be discovered in a couple of different ways. Figure 3 shows analysis of the EmailProvider.db SQLite file in Base, a GUI SQLite client. An even easier way to find user information is by simply running the ?strings? utility against the database file, as seen in Figure 4.

Figure 3: Email credentials disclosure

WiFi

The email situation is bad, but equally shocking is the method in which the Android system stores WiFi configuration information. Navigating to the /data/misc/wifi directory yields a configuration file called wpa_supplicant.conf on a Samsung Captivate that stores configuration information for every WiFi network the device has connected to ? in cleartext. Assuming the data is disclosed to an attacker, an organization?s only defense is the use of multifactor authentication for their wireless networks, i.e., if corporate enterprise is using a combination of username and password exclusively, this could be a serious issue. The configuration file stores SSID, key management type, and the pre-shared key for the network.

Figure 4: Email credentials disclosure

Conclusion

Now, obviously various mitigating controls exist for protecting a user?s data on a mobile device, most notably the hardware-based encryption and Data Protection on the iPhone 4 and above, and encryption Android devices with Gingerbread. Passcodes lock devices, and in the case of Data Protection, enable a secondary layer of software-based encryption. That said, a recent study indicated over 50% of users don?t use a passcode at all on their devices, and another 20% utilize a 4-character combination that can be easily guessed in the usual 10 tries allotted ? 1234, 4321, 9876, and so on. Add to this the ability to deploy OpenSSH as part of the jailbreaking process for iOS devices, the most prevalent choice for the Enterprise, or simply crack the passcode, and loss or theft is illuminated as a serious threat to data security. In the current ecosystem, with physical access to the device, it?s game over.

Joey Peloquin

Joey Peloquin is the director of mobile security at FishNet Security, where he?s responsible for MDM technology review, mobile security research, testing methodologies, and business development. He?s spent the last twelve of twenty years in IT specializing in Information Security. His experience ranges from risk assessment to intrusion analysis and incident response, network and application penetration testing, and mobile forensics.

]]>
Novatel?s MiFi 2352 HSPA Review2009-06-22T11:34:29+02:002009-06-22T11:34:29+02:00tag:wardriving.pl,2020://1.6SlashGear has gotten their hands on the new Novatel MiFi 2352. What makes this different from the previous version offered by Verizon and Sprint? Well, this one is GSM based and could see 3G download ...Wayne SlavinNetStumbler
SlashGear has gotten their hands on the new Novatel MiFi 2352. What makes this different from the previous version offered by Verizon and Sprint? Well, this one is GSM based and could see 3G download speeds of up to 7.2 Mbits and upload speeds of nearly 5.76 Mbits.

For a detailed review, including unboxing pictures of this personal WiFi hotspot check out the review below.

]]>
Verizon Opens Up, Will Support Any Device, Any App On Its Network2007-12-18T00:45:00+01:002007-12-18T00:45:00+01:00tag:wardriving.pl,2020://1.7Verizon has joined the bandwagon and announced a new open access plan for its network. This plan will go into effect next year and means any application can run on any device from any manufacturer and ...Kristin AbrahamNetStumbler
Verizon has joined the bandwagon and announced a new open access plan for its network. This plan will go into effect next year and means any application can run on any device from any manufacturer and will have full access to the Verizon spectrum.

Verizon representatives say this move was prompted by two different motives, the first being more sophisticated customer needs and the second is an explosion in innovation. They are hoping to see an wave of wireless devices flood the market in more arenas than the traditional handset market.

Some speculate that this decision is tied to the upcoming 700MHz spectrum auction, Verizon denies this was their motivation but the timing couldn’t be more coincidental.
Via [arstechnica.com]

]]>
Google May Get Its Open-access Wishes After All; Will Bid In 700MHz Auction2007-12-01T02:33:33+01:002007-12-01T02:33:33+01:00tag:wardriving.pl,2020://1.8The much anticipated 700MHz spectrum auction in January officially has another bidder. Google has announced that it will toss its hat in the ring.
A Google representative says that the company&#8217;s ...Kristin AbrahamNetStumbler
The much anticipated 700MHz spectrum auction in January officially has another bidder. Google has announced that it will toss its hat in the ring.

A Google representative says that the company’s goal is to offer American consumers more choices in an open and competitive wireless world. Officially, Google doesn’t have to announce its plans until December 3rd so until then speculations abound.

Some say Google has no interest in becoming a network provider, others look to the previously proposed four open access provisions, or possibly they will lease space to others. Nothing is certain at this point except that when Google does make its plans known it will create a nationwide buzz.
Via [arstechnica.com]

]]>
CBS Offers Midtown Manhattan Free Wireless Internet Access2007-11-29T20:12:11+01:002007-11-29T20:12:11+01:00tag:wardriving.pl,2020://1.9CBS has just made an announcement that is sure to delight New Yorkers. From Times Square to Central Park and from 6th to 8th Avenue will become the new CBS Mobile Zone. This zone will carry free Wi-Fi ...Kristin AbrahamNetStumbler
CBS has just made an announcement that is sure to delight New Yorkers. From Times Square to Central Park and from 6th to 8th Avenue will become the new CBS Mobile Zone. This zone will carry free Wi-Fi for cell phones, laptops and other devices that want to access the internet or even make voice over internet phone calls.

In return, CBS gets ad impressions, tons of them. Visitors to the region will be greeted with a sponsored homepage with hyperlocal news and information for people within the specified area.

CBS Outdoor Chairman and CEO, Wally Kelly, explains that this is just one example of how CBS is dedicated to turning Outdoor assets into next-generation interactive platforms.
Via [centernetworks.com]

]]>
Can WiMax Make It In The U.S.?2007-11-19T20:00:56+01:002007-11-19T20:00:56+01:00tag:wardriving.pl,2020://1.10The deal struck between Sprint Nextel and Clearwire back in July has been scrubbed and the national WiMAX network took a hit. Both companies say they will continue to work on the technology independen ...Kristin AbrahamNetStumbler
The deal struck between Sprint Nextel and Clearwire back in July has been scrubbed and the national WiMAX network took a hit. Both companies say they will continue to work on the technology independently.

Although both companies appear committed to developing WiMAX, their shareholders may actually hold the reins as huge sums of money are necessary to go forward.

Manufacturers of WiMAX equipment feel the technology is still sound and they plan to go ahead with device creation, it just may take longer for the technology to take hold. AAA So, the future of WiMAX is uncertain, it may be better suited for emerging markets than the U.S., only time will tell.
Via [news.com]

]]>
Clearwire, Sprint Call Their Deal Off2007-11-15T05:42:59+01:002007-11-15T05:42:59+01:00tag:wardriving.pl,2020://1.11The recent departure of Sprint CEO, Gary Forsee, is having some far reaching impact. The WiMAX build out between Sprint Nextel and Clearwire is the latest victim as the proposed joint, nationwide WiMA ...Kristin AbrahamNetStumbler
The recent departure of Sprint CEO, Gary Forsee, is having some far reaching impact. The WiMAX build out between Sprint Nextel and Clearwire is the latest victim as the proposed joint, nationwide WiMAX effort has been dropped.

Sprint’s corporate shake up was not the only reason the proposed venture was nixed,the complexities of the transaction were also cited as a stumbling block. So that leaves the American WiMAX project in a bit of a conundrum, do Sprint and Clearwire go out and forge independent networks or will new bonds form?

In the meantime, WiMAX is progressing nicely overseas, proving that they technology is valid and workable.
Via [gigaom.com]

]]>
High-speed Wireless Video Transfers 100X Faster Than WiFi On Tap2007-11-05T18:56:21+01:002007-11-05T18:56:21+01:00tag:wardriving.pl,2020://1.12IBM has joined forces with MediaTek to develop microprocessor chipsets that will wirelessly transmit videos almost instantly.
These chipsets will let you connect HDTVs with set top boxes without the n ...Kristin AbrahamNetStumbler
IBM has joined forces with MediaTek to develop microprocessor chipsets that will wirelessly transmit videos almost instantly.

These chipsets will let you connect HDTVs with set top boxes without the need for wires. They will also transfer data at rates of at least 100 times that of current WiFi standards.

This new technology, mmWave wireless, is expected to be used widely in homes and offices.
Via [networkworld.com]

]]>
WiMAX Is 3G2007-11-01T17:22:04+01:002007-11-01T17:22:04+01:00tag:wardriving.pl,2020://1.13WiMAX has a reason to celebrate. The International Telecommunications Union has just approved the non-cellular technology as part of a 3G standard. This means that operators with 3G spectrum in their ...Kristin AbrahamNetStumbler
WiMAX has a reason to celebrate. The International Telecommunications Union has just approved the non-cellular technology as part of a 3G standard. This means that operators with 3G spectrum in their 2.5 GHz bands globally can use WiMAX to build out a spectrum.

The last interface added was back in 1999 when ITU added IMT-2000 as it established the original technologies. IMT-2000 and five other cellular standards had to be used in the 3G standard, now the door is open to WiMAX.

But all is not rosey for WiMAX, the debate between technologies is far from over.
Via [wirelessweek.com]

]]>
Wi-Fi Health Study Gets Go Ahead2007-10-25T12:57:14+02:002007-10-25T12:57:14+02:00tag:wardriving.pl,2020://1.14The BBC has announced that the Health Protection Agency is going to begin a systematic research program on how WiFi is used. The goal of this study is to determine how WiFi is being used and the possi ...Kristin AbrahamNetStumbler
The BBC has announced that the Health Protection Agency is going to begin a systematic research program on how WiFi is used. The goal of this study is to determine how WiFi is being used and the possible radiation exposure that results from such use.

Spokesmen from the HPA believe that the study will confirm the safety of using WiFi, but feel that since England’s Chief Medical Officer suggested children limit their non-essential cell phone use due to potential exposure to radiation that a study into the radition emmissions of WiFi was the next logical step.

Results of the study will be publicly available, but officials reinforce their belief that WiFi is safe.
Via [bbc.co.uk]

]]>
WiMAX Backers Positioning 802.16e As An Alternative To Municipal WiFi2007-10-17T12:04:11+02:002007-10-17T12:04:11+02:00tag:wardriving.pl,2020://1.15Chicago&#8217;s WiMAX World show displayed a large rift between Mobile WiMAX supporters and municipal WiFi.
With continued problems halting all progress in the municipal WiFi world, WiMAX supports say ...Kristin AbrahamNetStumbler
Chicago’s WiMAX World show displayed a large rift between Mobile WiMAX supporters and municipal WiFi.

With continued problems halting all progress in the municipal WiFi world, WiMAX supports say they have the solutions. They contend that their licensed spectrum will guarantee continuous coverage and that indoor reception will not be as problematic as it is for WiFi.

But all is not rosy in the world of WiMAX, hardware is a huge problem. Every laptop has built-in support for 802.11b/g and will soon have 802.11n, this won’t be the case for WiMAX for quite some time, several years at least.

Right now all eyes are on Sprint and their pricing of Xohm. A reasonable price point may make or break a WiMAX solution for the masses.
Via [arstechnica.com]

]]>
Silicon Valley Wireless Nears Crunch Time2007-10-02T11:22:35+02:002007-10-02T11:22:35+02:00tag:wardriving.pl,2020://1.16Another massive wireless network has fallen behind schedule, this time the location is California&#8217;s Silicon Valley. About 40 municipalities over a 1500 square mile area are still in negotiations ...Kristin AbrahamNetStumbler
Another massive wireless network has fallen behind schedule, this time the location is California’s Silicon Valley. About 40 municipalities over a 1500 square mile area are still in negotiations but representatives have said that the model should be completed by the end of the year.

So far the delay has been blamed on technological improvements and changes and the deeply complex process of covering multiple technologies and different services. This may be so, but the template agreement is still not finalized and even when finally done, it still needs to go to individual municipalities for some tweaking.

Like the struggling citywide Wi-Fi in other cities across the country, their plan is very ambitious and progress is slow.
Via [infoworld.com]

]]>
Apple Eyes The Wireless Auction2007-10-01T07:00:32+02:002007-10-01T07:00:32+02:00tag:wardriving.pl,2020://1.17The upcoming wireless auction may be drawing another high roller. BusinessWeek has reported that Apple is looking at the possibilities of a purchase.
It&#8217;s believed that this chunk of wireless sp ...Kristin AbrahamNetStumbler
The upcoming wireless auction may be drawing another high roller. BusinessWeek has reported that Apple is looking at the possibilities of a purchase.

It’s believed that this chunk of wireless spectrum is the last available for creating a mainstream broadband network. It’s believed that signals in this 700Mhz spectrum will be able to provide faster Internet access than the cellular and WiFi options available today.

One upside of Apple purchasing the spectrum would be service to iPhone owners. They would no longer have to depend on the phone company but could use a net telephony service for cheaper, more reliable service.

There are other implications for Apple and some of them aren’t so good, for instance their margins would definitely drop.

At this point it appears as if Apple won’t bite but they’re approaching the auction well informed.
Via [businessweek.com]

]]>
Google Launches US Wireless Crusade2007-09-25T19:02:16+02:002007-09-25T19:02:16+02:00tag:wardriving.pl,2020://1.18Google is looking to offer 95% of the population free broadband within the next 10 years. Unfortunately, it seems that the FCC is thwarting their efforts.
Google has contacted the FCC and explained to ...Kristin AbrahamNetStumbler
Google is looking to offer 95% of the population free broadband within the next 10 years. Unfortunately, it seems that the FCC is thwarting their efforts.

Google has contacted the FCC and explained to them their interest in a wireless proposal set forth by M2Z Networks. M2Z is hoping to lease an unused slice of wireless spectrum between 2155 to 2175 MHz.

The FCC’s stance is that they’re waiting to hear how the public wants the spectrum to be used and licensed.

]]>
IOGEAR Ships Wireless USB Hub, Finally2007-09-24T17:04:38+02:002007-09-24T17:04:38+02:00tag:wardriving.pl,2020://1.19IOGEAR&#8217;s Wireless USB hub is now for sale to interested customers. The price tag: $199.95.
The device goes by the name of GUWH104KIT and includes a router with four wired USB hubs. It can wirele ...Eliza VillarinoNetStumbler
IOGEAR’s Wireless USB hub is now for sale to interested customers. The price tag: $199.95.

The device goes by the name of GUWH104KIT and includes a router with four wired USB hubs. It can wirelessly link different Wireless USB adapters or notebooks.

The company first announced this product in June 2006 and the first Wireless USB certifications were performed earlier this year. IOGEAR’s Wireless USB hub can work with current and future Certified W-USB devices.
Via [extremetech.com]